Extended Study Sketchbook Summester 2
Jamie Drummond
-Problem: looking back at the last 4 months of your work, what hasn’t gone well and how will you look to resolve it? • Ive really struggled to pin down what i want to do last summester. Ive had a few ideas floating about but nothing that really solid and exciting. The ideas i have had have lacked some relevance. For example, I need to make sure i am Communicating something through all of my work. Not sure that artistic endeavours are enough alone. • I need to sit down with multiple people and have a discussion about my work and hope that this sparks some promising ideas off. If im not feeling it, something drastic needs to happen.Im apprehensive to rehaul the whole project but to me its getting more and more likely - Question: Based on your work so far, what is a new question (or line of enquiry) to help you to deepen your understanding of your topic? • How is space allocated for advertising throughout bristol. How do works of street art get commisioned and allowed, and how much of bristols street art is technically illegal. - Outcome: an outcome you will produce for next Monday (could be one poster, spreads for the start of a new publication, small gif, etc. - Opposite
Schedule here
Presents a sort of conflict of interest, is this an advert from the company or is this an advert against it. It can be considered as both depending on how an audience reacts.
https://vimeo.com/153406984
I went around the city centre handing out fliers as an experiement into grabbing attention. The method seemed innefective at promoting action as I only got a few responses, however I did learn how easy it is to get people to take a flier from you, whilst some people just straight out ignore you.
Unfortunately these responses were not intiated by handing out the fliers but rather using an online advert.
History of telecommunication - Wiki. The history of telecommunication - the transmission of signals over a distance for the purpose of communication - began thousands of years ago with the use of smoke signals and drums in Africa, America and parts of Asia. In the 1790s the first fixed semaphore systems emerged in Europe however it was not until the 1830s that electrical [telecommunication] systems started to appear. Timeline of communication tools, 2014 update..jpg Distance telecommunications[edit] Visual, auditory and ancillary methods (non-electrical): Prehistoric: Fires, Beacons, Smoke signals, Communication drums, Horns 6th century BCE: Mail 5th century BCE: Pigeon post 4th century BCE: Hydraulic semaphores 15th century CE: Maritime flag semaphores 1672: First experimental acoustic (mechanical) telephone 1790: Semaphore lines (optical telegraphs) 1867: Signal lamps 1877: Acoustic phonograph Basic electrical signals: 1838: Electrical telegraph. See: Telegraph history 1858: First trans-Atlantic telegraph cable 1876: Telephone. See: Invention of the telephone, History of the telephone, Timeline of the telephone 1880: Telephony via lightbeam photophones Advanced electrical and electronic signals: 1893: Wireless telegraphy 1896: Radio. See: History of radio. 1914: First North American transcontinental telephone calling 1927: Television. See: History of television 1927: First commercial radio-telephone service, U.K.–U.S. 1930: First experimental videophones 1934: First commercial radio-telephone service, U.S.–Japan 1936: World’s first public videophone network 1946: Limited capacity Mobile Telephone Service for automobiles 1956: Transatlantic telephone cable 1962: Commercial telecommunications satellite 1964: Fiber optical telecommunications 1965: First North American public videophone network 1969: Computer networking 1973: First modern-era mobile (cellular) phone 1979: INMARSAT ship-to-shore satellite communications 1981: First mobile (cellular) phone network 1982: SMTP email 1983: Internet. See: History of Internet 1998: Mobile satellite hand-held phones 2003: VoIP Internet Telephony 2013: Google Glass
Spoken language is thought to have evolved ~200,000 - 500,000 years ago
Smoke Signals + Drums - Prehistoric
PAST
Symbolic imagery (Cave Paintings) ~32,000 YA Petroglyphs (Rock Carvings) ~12,000 YA Ideograms (Abstract Symbolism) ~7000 YA Middle Eastern Cuneiform + Beginings of Chinese ~5000 YA First formal non public Post Service (Eygptian) ~4400 YA
Cunieform began representing syllables of spoken language ~4000 YA Phoenecian Alphabet evolved from Heiroglyphs ~3000 YA Greek Alphabet ~2600 YA Carrier Pidgeon ~2000 YA Public Postrider (Mail by horse) ~1700YA First printing Press ~480 YA (1520AD) Morse code and the first long distance electric telegraph line ~ 160 YA First Telephones ~ 120 YA Radio ~100 YA First public videophone network -80 YA 1936 Digital Billboards ~ 40 YA First Mobile Network ~ 35 YA The Internet -33 YA Voice over IP -12 YA With Android and IOS Smarthphones become widspread -8 YA Google glass experimental phase -3 YA Smartphones will continue to diversify. Built in projectors Augmented reality 3D screens 3D Printers will become commonplace, prodcuts will be printed at home, instead of delivered Paperthin and flexible screens Video conferencing that negates the need to point the phone Instantaneous Translation - language barriers could dissapear Tactile ultrasound devices - allow you to feel things that arent thre Integrated Computers - computer screens implanted into the eyes? Brain to computer interfaces may allow transmition of information This could lead to Electronic telepathy Or connection with a “Simulated Reality” or “Digital Existence”
pRESENT
Future
https://vimeo.com/156962648 - animation test
what
if tech
becomes
aware?
what if technology becomes aware?
technological evolution will render our future innovations unrecognizable to the people of today
http://fontstruct.com/fontstructions/show/1246221/aeleonorae
COMPLIMENTARy
a e i m q t x
b f j n r u t
c g k o s v z
d h l p t w ?
The Quick Brown Fox Jumps Over The Lazy Dog @
,
Surveillance technologies have dangerously outpaced democratic restraints, meaning privacy is no longer a human right de facto. Worldwide surveillance silently re-engineers the balance of power in society, potentially leaving the population defenceless. Everyone is watched, particularly through digital means, and the information that is retrieved is stored for indefinite periods. Ready to be looked over and scrutinized. Not only do the governments of many developed country’s have access to shared international databases of personal data, but that data is vulnerable to theft from hackers and criminals that have made a £66billion industry out of identity fraud. So we must develop and learn about new methods of communicating securely and to fully understand the implications of releasing our data freely. The cipher symbolizes this need by employing a material process, untouchable to digital bulk collection. Unfamiliar letter forms make up an encryption code creating a basis for the possibility of secure communication. Simultaneously, the primitive nature of the cipher illustrates the developmental disparity between the public concern for privacy and the rise of international surveillance operations.
B
I
P
W
A
H
O
V
Y
R
K
D
Z
S
L
E
G R A P H I C
C I P H E R
A E L E O N O R A E
X
Q
J
C
T
M
F
U
N
G
PRESENTATION PREP
07/03/2015
FINISHED OUTCOMES: FLIER VIDEO How? Recorded myself Handing out promotional fliers with a call to action Why? Looking at the level of response you get from public interaction compared to oan onlince audience. WEBSITEHow? I Learned how to use photoshop and dreamweaver to create a basic static website and learned how to publish it. Why? Providing a place to communicate myself as a designer and reach an online audience. important to have a go too link for people to access and get a basic idea of you FUTURE OF COMMUNICATION POSTERS How? I illustrated the hypothetical appearance of poential future technologies and how they might be used Why? As a reminder of the things future technologys could bring us, and the fantastic possibilitys that may await. STAMPS + GRAPHIC CYPHER + CODEX POSTERS + FONT How? After scribbling acros a page, i turned some of the shapes into alien/ oriental looking letterforms, I then turned these into a font using fontstruct but was much mor e impressed with the rustic style that rubber stamp lettering provides. I used the symbols to create posters that comment on communication privacy in todays world Why? The symbols represent encryption and code, they are used to discuss privacy in my posters but could also be used to communicate any message providing the cipher is made available. OUTCOMES IN PROGRESS: COLLAGES + MIRROR How? Using digital and traditional techniques to artwork collages Why? similar to my future of communication posters, but they deal with the moral implications of advancing technology ICAN How? I Set up a network of string cans and attempted the creation of a sort of handset, unfortunaely i couldnt get the handset to work too well Why? Looking back at historical forms of communication i thought it would be interesting to “modernize� the concept and create a working model branded to seem contemporarty in origin
Camera
lense
Camera Hood
http://library.college.police.uk/docs/what-works/What-works-briefing-effects-ofCCTV-2013.pdf
GOOGLE PRIVACY CONCERNS Google’s March 1, 2012 privacy change enables the company to share data across a wide variety of services.[1] This includes embedded services in millions of third-party websites using Adsense and Analytics. The policy was widely criticized as creating an environment that discourages Internet innovation by making Internet users more fearful online.[2] Google’s CEO Eric Schmidt declared: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place. If you really need that kind of privacy, the reality is that search engines—including Google—do retain this information for some time and it’s important, for example, that we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities On 27 March 2015, the Court of Appeal ruled that British consumers have the right to sue Google in the UK for misuse of private information In April 2011, Google was criticized for not signing onto the Do Not Track feature for Chrome that is being incorporated in most other modern web browsers
FACEBOOK PRIVACY CONCERNS In 2015, it was reported that a growing number of Facebook users are being wrongfully and inexplicably suspended from their accounts by Facebook to give up copies of their private identification information. If such information is not given up, users suffer permanent restriction from their accounts with no alternative way of retrieving them back. The private identification being summoned by the website from its users include copies of their driver’s license, state-issued ID cards, passports, military cards, photo IDs, etc. anyone could get access to information saved to a Facebook profile, even if the information was not intended to be made public.[4] A “connection” is created when a user clicks a “Like” button for a product or service, either on Facebook itself or an external site. Facebook treats such relationships as public information, and the user’s identity may be displayed on the Facebook page of the product or service Instant Personalization was a pilot program which shared Facebook account information with affiliated sites, such as sharing a user’s list of “liked” bands with a music website, so that when the user visits the site, their preferred music plays automatically In August 2007, the code used to generate Facebook’s home and search page as visitors browse the site was accidentally made public.[6][7] A configuration problem on a Facebook server caused the PHP code to be displayed instead of the web page the code should have created, raising concerns about how secure private data on the site was. A visitor to the site copied, published and later removed the code from his web forum, claiming he had been served and threatened with legal notice by Facebook Facebook developed new privacy features to give users some control over information about them that was broadcast by the News Feed.[16] According to subsequent news articles,
IMSI CATCHER AWARE Department of Justice has been working with local police departments across the country to squelch public-records requests on controversial cell-phone surveillance technology. The Wireless Telegraphy Act 2006 section 48 makes it a summary offence for a person to use wireless telegraphy apparatus with intent to obtain or disclose information as to the contents of a message without authorization. See Stones 8.30112P. The prosecution must prove use, which imputes some form of utilization or employment of the apparatus over and above mere possession. Evidence of switching on or tuning to unauthorized frequencies assists in proving use.
ANALOGUE PRIVACY
“It is that the government believes as a matter of principle that every innocent act of communication online must leave a trace for future possible interrogation by the state. No other country in the world feels the need to do this apart from Russia.� The best way to take control over a people and control them utterly is to take a little of their freedom at a time, to erode rights by a thousand tiny and almost imperceptible reductions. In this way, the people will not see those rights and freedoms being removed until past the point at which these changes cannot be reversed. The Investigatory powers bill aims to provide a lawful basis for every individuals digital communications, data, and locations history to be saved by the government for possible interogration at a later date. Of course, they have already been doing this. Illegally. This is the digital age. So dont let your privacy become obsolete, just because analogue is. society is moving towards a state of mass surveillance with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically purged
When all your data was kept on paper only you had access. It’s no longer physical. but copied in digital. By the leaders, surveilling the masses. private data should not become obsolete just because technology is developing. Beware of the investgatory powers bill. It is violating your human right to privacy.
www.amnesty.org.uk/issues/Mass-surveillance
“STRING AND CAN IS UNTRACEABLE. BIN THE PHONE.” In the UK there are 653 Government bodies that are able to use sophisticated techniques to highlight individuals of interest and intercept their personal phone calls. This could include targeting fly tippers, drug dealers and other criminal activity but often results in innocent people being bugged because of flaws in the administration. The Governments of the UK, USA, CAN, NZ, and AUS spy on each other and gather private information from each others citizens. By sharing this information between them they sidestep domestic surveillance laws. So not only is our government eavesdropping on innocent phone calls. So is the rest of the world... But should you stop using connected technology just to protect your privacy? You could start using a String and Can to communicate with people. But why should you change your behaviour because Intelligence agency’s are doing the wrong thing? Learn more about surveillance. Learn to...
“USE A POLAROID. AND OUTSMART SURVEILLANCE.” You email a cheeky snap to your lover. It ends up stored on a server in a datacentre. That could be in the UK, but your photo is moved across data centres anyway and those data centres could be located anywhere on earth. The Governments of the UK, USA, CAN, NZ, and AUS spy on foreign servers and gather private information from each others citizens. By sharing this information between each other they sidestep domestic surveillance laws. So not only does our government have a copy of your picture. So does the rest of the world... But should you stop using connected technology just to protect your privacy? You could switch back to using Polaroids and store them under lock and key. But why should you change your behaviour because Intelligence agency’s are doing the wrong thing? Learn more about surveillance. Learn to...
RECLAIM YOUR PRIVACY
Camera
lense
Camera Hood
CCTV SURVEILLANCE NETWORKS VERSION 1.1
DATX2-52S16
JMD1993
PRINT ON YELLOW. AFIX TO BACKBONE (ALSO YELLOW) SLIDE OVER NETS AND PAGES
CCTV A CRIME DETERRENT Closed-circuit television is at the frontier of private security solutions and has proliferated through our society creating a $ÂŁ17 billion market. Its shown to be effective at deterring some forms of criminal activity, with one study showing a 51 percent reduction in crime related to theft. As CCTV has found its way into western culture, the atmosphere in public spaces has changed. Although many us have grown to be familiar with CCTV, There is still a distinctly unwelcome anxiety that is felt when in its presence. This feeling can easily develop into fear when someone is aware they are up to no good, and is the reason why CCTV work so well. The fear alone of being caught or identified is enough to cut theft by half and deter other crime by a small but statistically significant amount. Some systems can be monitored live, but in most cases, recordings are played back to identify crime that already happened. Meaning, the most effective way of using a CCTV system as a crime deterrent is to make it clearly noticeable. Whist remaining obscure enough to sustain the illusion of being watched from uncertain direction
JAMIE DRUMMOND 2016 NOT FOR COMMERCIAL USE
CUT INSIDE SOLID LINES AND OUTSIDE SHAPES PRE FOLD DASHED LINES INWARD ASSEMBLE NETS AND GLUE TABS USING THE POLE FIX CAMERA TO BRACKET WIRE HOLES FOR ADDED REALISM DOTS ARE GUIDES DUPLICATE NETS TAKE ADVANTAGE OF THE PERCEPTIONS SURROUNDING SURVEILLANCE
POLE - PLACE THROUGH HOLES IN CAMERA AND BRACKET
ROLL THIS WAY >
LENSE FIX INSIDE CAMERA
CAMERA HOUSING
LENSE
TOP AXLE - ATTACH TO CAMERA
BRACKET - ATTACH TO WALL
BOTTOM AXLE - ATTACH TO BRACKET
TUCK UNDER
UNDER
OVER